Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography., , and . J. Inf. Process., (2017)A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks., , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 428-439. Springer, (2001)Consistency Verification of Specification Rules., , , , , and . ICFEM, volume 9407 of Lecture Notes in Computer Science, page 50-66. Springer, (2015)Improving the Security of Cryptographic Protocol Standards., , , , and . IEEE Secur. Priv., 13 (3): 24-31 (2015)Verifying a signature architecture: a comparative case study., , , , and . Formal Aspects Comput., 19 (1): 63-91 (2007)Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 239-246 (2005)Invisibly Sanitizable Digital Signature Scheme., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 392-402 (2008)Gait Analysis Using Stereo Camera in Daily Environment., , , and . EMBC, page 1471-1475. IEEE, (2019)Abstract Data Types in Event-B - An Application of Generic Instantiation, , , , and . CoRR, (2012)Cryptographic Approch for Workflow Systems., , and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 75-86. Springer, (2008)